Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Attack resistant computer system

a computer system and computer technology, applied in the field of computers, can solve the problems of computer power loss, encryption key erased, data stored in volatile memory being quickly lost,

Inactive Publication Date: 2014-07-31
IBM CORP
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a computer system that can detect if someone tries to access the computer without permission. When this happens, the system can quickly respond to protect the security of the computer. This is important because it can prevent people from getting information from the computer without permission, which can be a security risk. The computer system includes a processor, memory, and hardware to detect and respond to intrusions. A memory board assembly is also described, which includes a processor and memory chips all mounted on a substrate. This assembly can also detect and respond to intrusions. The power storage device in the assembly ensures that the processor and memory chips can still operate even if there is no power in the computer.

Problems solved by technology

A basic assumption of volatile memory is that when volatile memory loses its substantially continuous energy supply (typically electrical power), the data stored in the volatile memory will be quickly lost.
This assumption has been proven incorrect, at least for some volatile memories, when the volatile memory is cooled to a relatively low temperature that is sufficiently low to cause a volatile memory to maintain its data for a substantial amount of time even after the energy source of the volatile memory has been cut off or otherwise removed.
It is assumed that if the computer that stores the encryption key is stolen, then the computer will lose its power and the encryption key will be erased before an unauthorized party can make use of the encryption key (and / or other sensitive data) stored in the volatile memory.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack resistant computer system
  • Attack resistant computer system
  • Attack resistant computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012]As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,”“module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer-readable medium(s) having computer readable program code / instructions embodied thereon.

[0013]Any combination of computer-readable media may be utilized. Computer-readable media may be a computer-readable signal medium or a computer-readable storage medium. A computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer system where a second, dedicated processor (sometimes called an SPU, to distinguish from the central processing unit (CPU)) has logic to manage and control an intrusion detection hardware set and an intrusion response hardware set. The intrusion response hardware detects physical intrusions (for example, cryogenic attacks), and the response hardware set responds in various ways to attempt to protect the sensitive data in a volatile memory from the detected physical intrusion. A dedicated power storage device powers the SPU and the intrusion response hardware set.

Description

FIELD OF THE INVENTION[0001]The present invention relates generally to the field of computers that include volatile memory (such as a volatile random-access memory), and more particularly to computers that store sensitive information (such as encryption keys or decrypted information that is normally subject to encryption) in a volatile memory.BACKGROUND OF THE INVENTION[0002]Storing data in volatile memory devices is known. As used herein, the term “volatile memory” is any data storage memory that requires a substantially continuous supply of energy, under normal operating conditions, in order to reliably maintain the data stored in the volatile memory. It is understood that many volatile memories operate on an energy supply that is intermittent, but, even in these cases, the intervals are frequent such that the energy supply should be understood to be understood to be “substantially continuous” for purposes of this document.[0003]Random-access memory (RAM) is known. As used herein,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/55
CPCG06F21/55G06F21/86
Inventor KELLEY, JOHN F.SEAGER, TODD
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products